skip to content
Computer networking : a top-down approach Preview this item
ClosePreview this item
Checking...

Computer networking : a top-down approach

Author: James F Kurose; Keith W Ross
Publisher: Boston : Pearson, 2013.
Edition/Format:   Print book : English : 6th edView all editions and formats
Summary:
Overview: Building on the successful top-down approach of previous editions, the Sixth Edition of Computer Networking continues with an early emphasis on application-layer paradigms and application programming interfaces, encouraging a hands-on experience with protocols and networking concepts. With this edition, Kurose and Ross have revised and modernized treatment of some key chapters to integrate the most current  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Lehrbuch
Document Type: Book
All Authors / Contributors: James F Kurose; Keith W Ross
ISBN: 9780132856201 0132856204
OCLC Number: 769141382
Description: xxiv, 862 pages : illustrations ; 24 cm
Contents: Computer Networks And The Internet: --
What is the Internet?: --
Nuts-and-bolts description --
Services description --
What is a protocol? --
Network edge: --
Access networks --
Physical media --
Network core: --
Packet switching --
Circuit switching --
Network of networks --
Delay, loss, and throughput in packet-switched networks: --
Overview of delay in packet-switched networks --
Queuing delay and packet loss --
End-to-end delay --
Throughput in computer networks --
Protocol layers and their service models: --
Layered architecture --
Encapsulation --
Networks under attack --
History of computer networking and the Internet: --
Development of packet switching: 1961-1972 --
Proprietary networks and Internetworking: 1972-1980 --
Proliferation of networks: 1980-1990 --
Internet explosion: 1990s --
New millennium --
Summary --
Homework problems and questions --
Wireshark Lab --
Interview: Leonard Kleinrock --
Application Layer: --
Principles of network applications: --
Network application architectures --
Processes communicating --
Transport services available to applications --
Transport services provided by the Internet --
Application-layer protocols --
Network applications covered in this book --
Web and HTTP: --
Overview of HTTP --
Non-persistent and persistent connections --
HTTP message format --
User-server interaction: cookies --
Web caching --
Conditional GET --
File Transfer: FTP: --
FTP commands and replies --
Electronic mail in the Internet: --
SMTP --
Comparison with HTTP --
Mail message formats --
Mail access protocols --
DNS-Internet's directory service: --
Services provided by DNS --
Overview of how DNS works --
DNS records and messages --
Peer-to-peer applications: --
P2P File distribution --
Distributed Hash Tables (DHTs) --
Socket programming: creating network applications: --
Socket programming with UDP --
Socket programming with TCP --
Summary --
Homework problems and questions --
Socket programming assignments --
Wireshark Labs: HTTP, DNS --
Interview: Marc Andreessen --
Transport Layer: --
Introduction and transport-layer services: --
Relationship between transport and network layers --
Overview of the transport layer in the Internet --
Multiplexing and demultiplexing --
Connectionless transport: UDP: --
UDP Segment structure --
UDP Checksum --
Principles of reliable data transfer: --
Building a reliable data transfer protocol --
Pipelined reliable data transfer protocols --
Go-Back-N (GBN) --
Selective Repeat (SR) --
Connection-Oriented Transport: TCP: --
TCP Connection --
TCP Segment structure --
Round-trip time estimation and timeout --
Reliable data transfer --
Flow control --
TCP connection management --
Principles of congestion control: --
Causes and the costs of congestion --
Approaches to congestion control --
Network-assisted congestion-control example: ATM ABR congestion control --
TCP congestion control: --
Fairness --
Summary --
Homework problems and questions --
Programming assignments --
Wireshark Labs: TCP, UDP --
Interview: Van Jacobson --
Network Layer: --
Introduction: --
Forwarding and routing --
Network service models --
Virtual circuit and datagram networks: --
Virtual-circuit networks --
Datagram networks --
Origins of VC and datagram networks --
What's inside a router?: --
Input processing --
Switching --
Output processing --
Where does queuing occur? --
Routing control plane --
Internet Protocol (IP): forwarding and addressing in the Internet: --
Datagram format --
IPv4 addressing --
Internet Control Message Protocol (ICMP) --
IPv6 --
Brief foray into IP security --
Routing algorithms: --
Link-State (LS) routing algorithm --
Distance-Vector (DV) routing algorithm --
Hierarchical routing --
Routing in the Internet: --
Intra-AS routing in the Internet: RIP --
Intra-AS routing in the Internet: OSPF --
Inter-AS routing: BGP --
Broadcast and multicast routing: --
Broadcast routing algorithms --
Multicast --
Summary --
Homework problems and questions --
Programming assignments --
Wireshark Labs: IP, ICMP --
Interview: Vinton G Cerf. Link Layer: Links, Access Networks, And LANs: --
Introduction to the link layer: --
Services provided by the link layer --
Where is the link layer implemented? --
Error detection and -correction techniques: --
Parity checks --
Checksumming methods --
Cyclic Redundancy Check (CRC) --
Multiple access links and protocols: --
Channel partitioning protocols --
Random access protocols --
Taking-turns protocols --
DOCSIS: Link-layer protocol for cable Internet access --
Switched local area networks: --
Link-layer addressing and ARP --
Ethernet --
Link-layer switches --
Virtual Local Area Networks (VLANs) --
Link virtualization: network as a link layer: --
Multiprotocol Label Switching (MPLS) --
Data center networking: --
Retrospective: Day in the life of a web page request: --
Getting started: DHCP, UDP, IP, and Ethernet --
Still getting started: DNS and ARP --
Still getting started: intra-domain routing to the DNS server --
Web client-server interaction: TCP and HTTP --
Summary --
Homework problems and questions --
Wireshark Labs: Ethernet and ARP, DHCP --
Interview: Simon S Lam --
Wireless And Mobile Networks: --
Introduction --
Wireless links and network characteristics: --
CDMA --
WiFi: 802_11 wireless LANs --
802_11 Architecture --
802_11 MAC Protocol --
IEEE 802_11 Frame --
Mobility in the same IP subnet --
Advanced features in 802_11 --
Personal area networks: Bluetooth and Zigbee --
Cellular Internet access: --
Overview of cellular network architecture --
3G cellular data networks: extending the Internet to cellular subscribers --
On to 4G: LTE --
Mobility management: principles: --
Addressing --
Routing to a mobile node --
Mobile IP --
Managing mobility in cellular networks: --
Routing calls to a mobile user --
Handoffs in GSM --
Wireless and mobility: impact on higher-layer protocols --
Summary --
Homework problems and questions --
Wireshark Lab: IEEE 802_11 (WiFi) --
Interview: Deborah Estrin --
Multimedia Networking: --
Multimedia networking applications: --
Properties of video --
Properties of audio --
Types of multimedia network applications --
Streaming stored video: --
UDP Streaming --
HTTP Streaming --
Adaptive streaming and DASH --
Content distribution networks --
Case Studies: Netflix, YouTube, and KanKan --
Voice-over-IP: --
Limitations of the best-effort IP service --
Removing jitter at the receiver for audio --
Recovering from packet loss --
Case Study: VoIP with Skype --
Protocols for real-time conversational applications --
RTP --
SIP --
Network support for multimedia: --
Dimensioning best-effort networks --
Providing multiple classes of service --
Diffserv --
Per-connection Quality-of-Service (QoS) guarantees: resource reservation and call admission --
Summary --
Homework problems and questions --
Programming assignment --
Interview: Henning Schulzrinne --
Security In Computer Networks: --
What is network security? --
Principles of cryptography: --
Symmetric key cryptography --
Public key encryption --
Message integrity and digital signatures: --
Cryptographic hash functions --
Message authentication code --
Digital signatures --
End-point authentication: --
Authentication Protocol ap1-0 --
Authentication Protocol ap2-0 --
Authentication Protocol ap3-0 --
Authentication Protocol ap3-1 --
Authentication Protocol ap4_0 --
Securing E-mail: --
Secure E-mail --
PGP --
Securing TCP connections: SSL --
Big picture --
More complete picture --
Network-layer security: IPsec and virtual private networks: --
IPsec and Virtual Private Networks (VPNs) --
AH and ESP protocols --
Security associations --
IPsec datagram --
IKE: Key management in IPsec --
Securing wireless LANs: --
Wired Equivalent Privacy (WEP) --
IEEE802_11i --
Operational security: firewalls and intrusion detection systems: --
Firewalls --
Intrusion detection systems --
Summary --
Homework problems and questions --
Wireshark Lab: SSL --
IPsec Lab --
Interview: Steven M Bellovin --
Network Management: --
What is network management? --
Infrastructure for network management --
Internet-standard management framework: --
Structure of Management Information: SMI --
Management Information Base: MIB --
SNMP Protocol operations and transport mappings --
Security and administration --
ASN- --
Conclusion --
Homework problems and questions --
Interview: Jennifer Rexford --
References --
Index.
Responsibility: James F. Kurose, Keith W. Ross.
More information:

Abstract:

Overview: Building on the successful top-down approach of previous editions, the Sixth Edition of Computer Networking continues with an early emphasis on application-layer paradigms and application programming interfaces, encouraging a hands-on experience with protocols and networking concepts. With this edition, Kurose and Ross have revised and modernized treatment of some key chapters to integrate the most current and relevant networking technologies. Networking today involves much more than standards specifying message formats and protocol behaviors-and it is far more interesting. Professors Kurose and Ross focus on describing emerging principles in a lively and engaging manner and then illustrate these principles with examples drawn from Internet architecture.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(3)

User lists with this item (10)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/769141382> # Computer networking : a top-down approach
    a schema:CreativeWork, schema:Book ;
    library:oclcnum "769141382" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/mau> ;
    library:placeOfPublication <http://dbpedia.org/resource/Boston> ; # Boston
    schema:about <http://id.worldcat.org/fast/872297> ; # Computer networks
    schema:about <http://id.worldcat.org/fast/977184> ; # Internet
    schema:about <http://dewey.info/class/004.6/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/793152694#Topic/rechnernetz> ; # Rechnernetz
    schema:bookEdition "6th ed." ;
    schema:bookFormat bgn:PrintBook ;
    schema:contributor <http://viaf.org/viaf/85357157> ; # Keith W. Ross
    schema:creator <http://viaf.org/viaf/12531798> ; # James F. Kurose
    schema:datePublished "2013" ;
    schema:description "Link Layer: Links, Access Networks, And LANs: -- Introduction to the link layer: -- Services provided by the link layer -- Where is the link layer implemented? -- Error detection and -correction techniques: -- Parity checks -- Checksumming methods -- Cyclic Redundancy Check (CRC) -- Multiple access links and protocols: -- Channel partitioning protocols -- Random access protocols -- Taking-turns protocols -- DOCSIS: Link-layer protocol for cable Internet access -- Switched local area networks: -- Link-layer addressing and ARP -- Ethernet -- Link-layer switches -- Virtual Local Area Networks (VLANs) -- Link virtualization: network as a link layer: -- Multiprotocol Label Switching (MPLS) -- Data center networking: -- Retrospective: Day in the life of a web page request: -- Getting started: DHCP, UDP, IP, and Ethernet -- Still getting started: DNS and ARP -- Still getting started: intra-domain routing to the DNS server -- Web client-server interaction: TCP and HTTP -- Summary -- Homework problems and questions -- Wireshark Labs: Ethernet and ARP, DHCP -- Interview: Simon S Lam -- Wireless And Mobile Networks: -- Introduction -- Wireless links and network characteristics: -- CDMA -- WiFi: 802_11 wireless LANs -- 802_11 Architecture -- 802_11 MAC Protocol -- IEEE 802_11 Frame -- Mobility in the same IP subnet -- Advanced features in 802_11 -- Personal area networks: Bluetooth and Zigbee -- Cellular Internet access: -- Overview of cellular network architecture -- 3G cellular data networks: extending the Internet to cellular subscribers -- On to 4G: LTE -- Mobility management: principles: -- Addressing -- Routing to a mobile node -- Mobile IP -- Managing mobility in cellular networks: -- Routing calls to a mobile user -- Handoffs in GSM -- Wireless and mobility: impact on higher-layer protocols -- Summary -- Homework problems and questions -- Wireshark Lab: IEEE 802_11 (WiFi) -- Interview: Deborah Estrin -- Multimedia Networking: -- Multimedia networking applications: -- Properties of video -- Properties of audio -- Types of multimedia network applications -- Streaming stored video: -- UDP Streaming -- HTTP Streaming -- Adaptive streaming and DASH -- Content distribution networks -- Case Studies: Netflix, YouTube, and KanKan -- Voice-over-IP: -- Limitations of the best-effort IP service -- Removing jitter at the receiver for audio -- Recovering from packet loss -- Case Study: VoIP with Skype -- Protocols for real-time conversational applications -- RTP -- SIP -- Network support for multimedia: -- Dimensioning best-effort networks -- Providing multiple classes of service -- Diffserv -- Per-connection Quality-of-Service (QoS) guarantees: resource reservation and call admission -- Summary -- Homework problems and questions -- Programming assignment -- Interview: Henning Schulzrinne -- Security In Computer Networks: -- What is network security? -- Principles of cryptography: -- Symmetric key cryptography -- Public key encryption -- Message integrity and digital signatures: -- Cryptographic hash functions -- Message authentication code -- Digital signatures -- End-point authentication: -- Authentication Protocol ap1-0 -- Authentication Protocol ap2-0 -- Authentication Protocol ap3-0 -- Authentication Protocol ap3-1 -- Authentication Protocol ap4_0 -- Securing E-mail: -- Secure E-mail -- PGP -- Securing TCP connections: SSL -- Big picture -- More complete picture -- Network-layer security: IPsec and virtual private networks: -- IPsec and Virtual Private Networks (VPNs) -- AH and ESP protocols -- Security associations -- IPsec datagram -- IKE: Key management in IPsec -- Securing wireless LANs: -- Wired Equivalent Privacy (WEP) -- IEEE802_11i -- Operational security: firewalls and intrusion detection systems: -- Firewalls -- Intrusion detection systems -- Summary -- Homework problems and questions -- Wireshark Lab: SSL -- IPsec Lab -- Interview: Steven M Bellovin -- Network Management: -- What is network management? -- Infrastructure for network management -- Internet-standard management framework: -- Structure of Management Information: SMI -- Management Information Base: MIB -- SNMP Protocol operations and transport mappings -- Security and administration -- ASN- -- Conclusion -- Homework problems and questions -- Interview: Jennifer Rexford -- References -- Index."@en ;
    schema:description "Computer Networks And The Internet: -- What is the Internet?: -- Nuts-and-bolts description -- Services description -- What is a protocol? -- Network edge: -- Access networks -- Physical media -- Network core: -- Packet switching -- Circuit switching -- Network of networks -- Delay, loss, and throughput in packet-switched networks: -- Overview of delay in packet-switched networks -- Queuing delay and packet loss -- End-to-end delay -- Throughput in computer networks -- Protocol layers and their service models: -- Layered architecture -- Encapsulation -- Networks under attack -- History of computer networking and the Internet: -- Development of packet switching: 1961-1972 -- Proprietary networks and Internetworking: 1972-1980 -- Proliferation of networks: 1980-1990 -- Internet explosion: 1990s -- New millennium -- Summary -- Homework problems and questions -- Wireshark Lab -- Interview: Leonard Kleinrock -- Application Layer: -- Principles of network applications: -- Network application architectures -- Processes communicating -- Transport services available to applications -- Transport services provided by the Internet -- Application-layer protocols -- Network applications covered in this book -- Web and HTTP: -- Overview of HTTP -- Non-persistent and persistent connections -- HTTP message format -- User-server interaction: cookies -- Web caching -- Conditional GET -- File Transfer: FTP: -- FTP commands and replies -- Electronic mail in the Internet: -- SMTP -- Comparison with HTTP -- Mail message formats -- Mail access protocols -- DNS-Internet's directory service: -- Services provided by DNS -- Overview of how DNS works -- DNS records and messages -- Peer-to-peer applications: -- P2P File distribution -- Distributed Hash Tables (DHTs) -- Socket programming: creating network applications: -- Socket programming with UDP -- Socket programming with TCP -- Summary -- Homework problems and questions -- Socket programming assignments -- Wireshark Labs: HTTP, DNS -- Interview: Marc Andreessen -- Transport Layer: -- Introduction and transport-layer services: -- Relationship between transport and network layers -- Overview of the transport layer in the Internet -- Multiplexing and demultiplexing -- Connectionless transport: UDP: -- UDP Segment structure -- UDP Checksum -- Principles of reliable data transfer: -- Building a reliable data transfer protocol -- Pipelined reliable data transfer protocols -- Go-Back-N (GBN) -- Selective Repeat (SR) -- Connection-Oriented Transport: TCP: -- TCP Connection -- TCP Segment structure -- Round-trip time estimation and timeout -- Reliable data transfer -- Flow control -- TCP connection management -- Principles of congestion control: -- Causes and the costs of congestion -- Approaches to congestion control -- Network-assisted congestion-control example: ATM ABR congestion control -- TCP congestion control: -- Fairness -- Summary -- Homework problems and questions -- Programming assignments -- Wireshark Labs: TCP, UDP -- Interview: Van Jacobson -- Network Layer: -- Introduction: -- Forwarding and routing -- Network service models -- Virtual circuit and datagram networks: -- Virtual-circuit networks -- Datagram networks -- Origins of VC and datagram networks -- What's inside a router?: -- Input processing -- Switching -- Output processing -- Where does queuing occur? -- Routing control plane -- Internet Protocol (IP): forwarding and addressing in the Internet: -- Datagram format -- IPv4 addressing -- Internet Control Message Protocol (ICMP) -- IPv6 -- Brief foray into IP security -- Routing algorithms: -- Link-State (LS) routing algorithm -- Distance-Vector (DV) routing algorithm -- Hierarchical routing -- Routing in the Internet: -- Intra-AS routing in the Internet: RIP -- Intra-AS routing in the Internet: OSPF -- Inter-AS routing: BGP -- Broadcast and multicast routing: -- Broadcast routing algorithms -- Multicast -- Summary -- Homework problems and questions -- Programming assignments -- Wireshark Labs: IP, ICMP -- Interview: Vinton G Cerf."@en ;
    schema:description "Overview: Building on the successful top-down approach of previous editions, the Sixth Edition of Computer Networking continues with an early emphasis on application-layer paradigms and application programming interfaces, encouraging a hands-on experience with protocols and networking concepts. With this edition, Kurose and Ross have revised and modernized treatment of some key chapters to integrate the most current and relevant networking technologies. Networking today involves much more than standards specifying message formats and protocol behaviors-and it is far more interesting. Professors Kurose and Ross focus on describing emerging principles in a lively and engaging manner and then illustrate these principles with examples drawn from Internet architecture."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/793152694> ;
    schema:genre "Lehrbuch"@en ;
    schema:inLanguage "en" ;
    schema:name "Computer networking : a top-down approach"@en ;
    schema:productID "769141382" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/769141382#PublicationEvent/boston_pearson_2013> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/793152694#Agent/pearson> ; # Pearson
    schema:workExample <http://worldcat.org/isbn/9780132856201> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/769141382> ;
    .


Related Entities

<http://dbpedia.org/resource/Boston> # Boston
    a schema:Place ;
    schema:name "Boston" ;
    .

<http://id.worldcat.org/fast/872297> # Computer networks
    a schema:Intangible ;
    schema:name "Computer networks"@en ;
    .

<http://id.worldcat.org/fast/977184> # Internet
    a schema:Intangible ;
    schema:name "Internet"@en ;
    .

<http://viaf.org/viaf/12531798> # James F. Kurose
    a schema:Person ;
    schema:familyName "Kurose" ;
    schema:givenName "James F." ;
    schema:name "James F. Kurose" ;
    .

<http://viaf.org/viaf/85357157> # Keith W. Ross
    a schema:Person ;
    schema:birthDate "1956" ;
    schema:familyName "Ross" ;
    schema:givenName "Keith W." ;
    schema:name "Keith W. Ross" ;
    .

<http://worldcat.org/isbn/9780132856201>
    a schema:ProductModel ;
    schema:isbn "0132856204" ;
    schema:isbn "9780132856201" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.